O'Reilly logo

Game Programming Gems 8 by Adam Lake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5.1. Secure Channel Communication

Chris Lomont

This gem is an overview of creating secure networking protocols. There is not enough space to detail all pieces, so instead a checklist of items is presented that covers necessary points.

Online games must prevent cheaters from using tools and hacks to their advantage, often to the detriment of other players’ enjoyment. Cheating can be done through software add-ons or changes, often making the cheater too powerful for other players or performing denial-of-service attacks, making the game unresponsive for others’ requests, such as gold, items, services, and accounts. Since any code running on the client can be disassembled, studied, and modified, security decisions must be made ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required